ZyWALL 2 Series User’s Guide

Figure 14-9 Advanced IKE VPN Rule Setup ................................................................................................

14-25

Figure 14-10 Manual VPN Rule Setup ......................................................................................................

14-29

Figure 14-11 VPN SA Monitor ..................................................................................................................

14-33

Figure 14-12 VPN Global Setting..............................................................................................................

14-34

Figure 14-13 Telecommuters Sharing One VPN Rule Example ................................................................

14-36

Figure 14-14 Telecommuters Using Unique VPN Rules Example ............................................................

14-37

Figure 15-1 Certificate Configuration Overview .........................................................................................

15-2

Figure 15-2 My Certificates.........................................................................................................................

15-3

Figure 15-3 My Certificate Import...............................................................................................................

15-6

Figure 15-4 My Certificate Create ...............................................................................................................

15-7

Figure 15-5 My Certificate Details .............................................................................................................

15-11

Figure 15-6 Trusted CAs............................................................................................................................

15-15

Figure 15-7 Trusted CA Import..................................................................................................................

15-17

Figure 15-8 Trusted CA Details .................................................................................................................

15-18

Figure 15-9 Trusted Remote Hosts ............................................................................................................

15-22

Figure 15-10 Trusted Remote Host Import ................................................................................................

15-25

Figure 15-11 Trusted Remote Host Details................................................................................................

15-26

Figure 15-12 Directory Servers..................................................................................................................

15-29

Figure 15-13 Directory Server Add............................................................................................................

15-30

Figure 16-1 Local User Database.................................................................................................................

16-2

Figure 16-2 RADIUS...................................................................................................................................

16-4

Figure 17-1 HTTPS Implementation............................................................................................................

17-3

Figure 17-2 WWW.......................................................................................................................................

17-4

Figure 17-3 Security Alert Dialog Box (Internet Explorer) .........................................................................

17-6

Figure 17-4 Security Certificate 1 (Netscape)..............................................................................................

17-7

Figure 17-5 Security Certificate 2 (Netscape)..............................................................................................

17-8

Figure 17-6 Login Screen (Internet Explorer)............................................................................................

17-10

Figure 17-7 Login Screen (Netscape) .........................................................................................................

17-11

Figure 17-8 Replace Certificate .................................................................................................................

17-12

Figure 17-9 Device-specific Certificate .....................................................................................................

17-12

Figure 17-10 Common ZyWALL Certificate .............................................................................................

17-13

Figure 17-11 SSH Communication Example .............................................................................................

17-14

Figure 17-12How SSH Works....................................................................................................................

17-14

Figure 17-13 SSH ......................................................................................................................................

17-15

Figure 17-14 SSH Example 1: Store Host Key..........................................................................................

17-17

Figure 17-15 SSH Example 2: Test............................................................................................................

17-17

Figure 17-16SSH Example 2: Log in.........................................................................................................

17-18

Figure 17-17 Secure FTP: Firmware Upload Example..............................................................................

17-19

Figure 17-18 Telnet Configuration on a TCP/IP Network .........................................................................

17-19

Figure 17-19 Telnet ....................................................................................................................................

17-20

Figure 17-20 FTP.......................................................................................................................................

17-21

List of Figures

xvii